@@ -502,9 +502,9 @@ def verify_encryption_context(context: pulsar.EncryptionContext | None, failed:
502502 self .assertEqual (len (keys ), 1 )
503503 key = keys [0 ]
504504 self .assertEqual (key .key , "client-rsa.pem" )
505- self .assertTrue (len (key .value ) > 0 )
505+ self .assertGreater (len (key .value ), 0 )
506506 self .assertEqual (key .metadata , {})
507- self .assertTrue (len (context .param ()) > 0 )
507+ self .assertGreater (len (context .param ()), 0 )
508508 self .assertEqual (context .algorithm (), "" )
509509 self .assertEqual (context .compression_type (), CompressionType .LZ4 )
510510 if batch_size == - 1 :
@@ -558,7 +558,7 @@ def verify_next_message(value: bytes):
558558
559559 def verify_undecrypted_message (msg : pulsar .Message , i : int ):
560560 self .assertNotEqual (msg .data (), f"msg-{ i } " .encode ())
561- self .assertTrue (len (msg .data ()) > 5 , f"msg.data() is { msg .data ()} " )
561+ self .assertGreater (len (msg .data ()), 5 , f"msg.data() is { msg .data ()} " )
562562 verify_encryption_context (msg .encryption_context (), True , 2 if i >= 3 else - 1 )
563563
564564 # Encrypted messages will be consumed since the crypto failure action is CONSUME
0 commit comments